Multiple Choice
Refer to the exhibit. After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
A) encapsulation
B) NOP sled technique
C) address space randomization
D) heap-based security
E) data execution prevention
Correct Answer:
Verified
Related Questions